An Encrypted Anonymous Network Traffic Identification Method
An anonymous network and traffic identification technology, applied in the field of encrypted anonymous network traffic identification, can solve problems such as affecting classification effect and algorithm inefficiency, and achieve the effect of improving calculation speed, speeding up learning speed, and reducing overfitting.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the purpose, features and advantages of the present invention more obvious and understandable, the technical core of the present invention will be further described in detail below in conjunction with the accompanying drawings . It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0023] In the present invention, an effective encrypted anonymous network traffic identification method is designed. The general idea of the method is to use traffic extraction tools to extract flow features from raw traffic files, and filter the features through a novel hybrid feature selection algorithm to filter out redundant and irrelevant features. Then use the XGBoost algorithm to build a model to classify encrypted anonymous network traffic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


